Quantcast
Channel: Computer news – Alertsec Security Blog
Viewing all articles
Browse latest Browse all 86

Android vs iPhone Security

$
0
0
Android vs iPhone Security

Android vs iPhone Security

Apple/iOS

Pros of Apple’s iOS include the fact that it is proprietary, closed-source and more secure “by fault” with a single user per device,” said Jason Van Zanten, information security lead at JAMF Software. “The Apple App Store is tightly controlled, and the global partnership between Apple and IBM (IBM MobileFirst for iOS) empowers enterprise users.”

Jason also mentioned that Apple Push Notification service (APNs) for mobile device management, configuration profiles with device settings, app distribution, and remote management commands (lock, wipe, etc.) helps for security.

But some are cautious with above approach.

“While Apples approach is often seen as stronger in terms of security by providing a managed and controlled transaction environment, no system can truly be 100 percent fixed and closed off,” said Sam Rehman, chief technology officer for Arxan Technologies. “At times this could provide a false sense of security which emphasizes risks of certain weaknesses.”

“The Apple ecosystem has a lot to offer its users – except for the reality that there is no possibility of a truly secure brand or data control in any meaningful way,” agreed Andrew McLennan, vice president of the mobile security division, of INSIDE Secure. “The phone user is entirely in the hands of Apple and if there is a major breach it could be catastrophic.”

Android: a Popular Target

“Android offers much more freedom and control, and it is easily possible to get hardware-like security protection using software fixes with native languages such as C++,” McLennan said. “With the Android platform, you can control your own security destiny, particularly if using a mobile solution that also deals with device fragmentation.”

While this makes Android “generally a much better place to be than with the Apple platform,” he said, this is not true if Java is employed for sensitive code. “Java is completely useless for code that needs security, as it takes mere minutes to influence or subvert this code.”

James Quin, CDM Media senior director of content and c-suite communities, said studies show that as much as 97 percent of all mobile malware targets Android while iOS “suffers from functionally none.”

Android’s ubiquity accounts for much of its popularity with hackers, he said. “When malicious code writers sit down to develop threats, theyre going to do so in the manner that gives them the most attack surface, and that always comes from attacking the most populous platform.”

Alertsec strengthens security

Alertsec has created a web based encryption service that radically simplifies deployment and management of PC encryption by using industry leading Check Point Full Disk Encryption (former Pointsec) software.

Organizations, especially corporate giants, have to have an information security policy in place that proves they have taken the necessary steps and measures to safeguard the information they gathered. If these policies are not adhered to, the regulators may prosecute.

Alertsec Xpress is used by organizations that have recognized the need to protect their information. Customers range from single-user sole traders and consultants to multinational companies with a large number of offices around the globe. Over 4 million users worldwide use Alertsec Xpress’s Check Point Full Disk Encryption.


Viewing all articles
Browse latest Browse all 86

Trending Articles